Congratulation on you 10000 subs!!!) You deserve MORE!!!!
@Deepakkumar-pm2kt11 ай бұрын
Loved the video man. Learnt a lot from how your explanations.
@Fractal_reComm4 ай бұрын
Dude, I'm a big fan and I admire and inspire me, your work, I would like you to help me find simpler sites like this. Generally, my targets are very well protected, but it's possible to overcome them. them and this takes much more time than in simpler systems, I have little experience but I have already found some cool vulnerabilities, I still can't afford better education in cybersecurity, I would be very happy and I'm sure that the entire community that is also starting out would be very happy and would help a lot, thank you for everything, I hope you read it
@HunterX46111 ай бұрын
Congratulations bro for 10k fam ❤🎉Next milestone is of 50k subs😊
@abduls447911 ай бұрын
Awesome video.. thanks man
@islamkafafy698411 ай бұрын
Wow Dude you are amazing keep uploading top tier videos more
@zahiruddinahmad5511 ай бұрын
Please make a video 403/404 bypass
@ReligionAndMaterialismDebunked11 ай бұрын
Yeee. More of these would be awesome. Hehe. I know we can add hostname:3000, and some stuff like that.
@imran_hossain12310 ай бұрын
Thanks from Bangladesh
@gauravkesharwani55576 ай бұрын
Great explanation bro. Many people teach if we want to check for such vulnerabilities we need to use payloads like ../../../../etc/passwd. However you shared another perspective - why to just try /etc/passwd, if we can check with other files within web root leading to source code reveal. Thanks for sharing this content
@MRIDULSG11 ай бұрын
I have a question regarding this. What I understand is in LFI, you can actually execute the files on the server. In this case, the index.php file shall show the output of the executed version of the index.php file instead of showing the source code. In directory traversal, we can see the content of the file. Please Correct me if I'm wrong.
@BePracticalTech11 ай бұрын
Actually in local file inclusion, you will be able to see the contents of files present on the server. However, there are certain scenarios where you'll be able to execute the files(like you mentioned) but it depends from target to target. The vulnerable endpoint here was actually serving the content of the pdf that's why we were able to get the content of source code. Hope you understood
@hamzaannane88511 ай бұрын
From 10k to 100k 🎉🎉🎉 one day
@hackingstudy-g5h11 ай бұрын
you amazing man, thanks for the effort, you really work hard to give us the best content, and we appreciate it.
@BePracticalTech11 ай бұрын
Thank you
@akashpatel-bs8ve11 ай бұрын
Nice information, jump to 4:00 to main content 👍
@ReligionAndMaterialismDebunked11 ай бұрын
Early crew. :3
@medamine67457 күн бұрын
you haven't bypass the WAF, did you get /etc/passwd ? nope !
@mnoobb692 ай бұрын
Where are you from bro?
@BePracticalTech2 ай бұрын
India
@tanvirmridha11 ай бұрын
😮
@TechAmbition6 ай бұрын
Bro targeting real host *Only for educational purposes 😅
@hamzaannane88511 ай бұрын
Keep going 🎉🎉🎉 u are the best
@Be_Buddhaa11 ай бұрын
How many programming languages do you know?😢
@BePracticalTech11 ай бұрын
I know few programming languages
@Be_Buddhaa11 ай бұрын
@@BePracticalTech name please ?🥵🔥
@oswardgaming322311 ай бұрын
Bro i am new in bug hunting so suggest me the right path for bug hunting